Back to Home
sjkim1127 icon

Nexuscore_MCP

by sjkim1127

Overview

AI-driven dynamic malware analysis server for interactive debugging, inspection, and analysis of evasive malware.

Installation

Run Command
.\target\release\nexuscore_mcp.exe

Environment Variables

  • CAPE_API_URL
  • CAPE_API_TOKEN
  • RUST_LOG
  • VT_API_KEY
  • SCYLLA_PATH

Security Notes

The server's core functionality involves highly privileged operations such as process injection (Frida), memory manipulation, and interacting with low-level Windows APIs, which are inherently high-risk. While the codebase itself does not show direct malicious patterns or hardcoded secrets (API keys are fetched from environment variables), its power means that if the AI agent or the host running NexusCore were compromised, it could be used for malicious purposes. Explicit `unsafe` blocks are used for Windows API calls, which is common and justified for this domain. External tools like `tshark`, `handle.exe`, `procdump`, and `ScyllaTest.exe` are called without explicit path sanitization, relying on the system's PATH configuration, which introduces an environmental risk. The `inject_script` functions directly execute JavaScript, a core feature necessary for dynamic analysis by an AI agent, but this must be controlled by a trusted agent.

Similar Servers

Stats

Interest Score0
Security Score8
Cost ClassMedium
Avg Tokens1500
Stars0
Forks0
Last Update2025-12-06

Tags

Malware AnalysisDynamic AnalysisFridaAI AgentWindows Security